Abstract
In this note we study two cryptographic notions introduced in recent years: zero-knowledge proof systems [GMR] and instance-hiding schemes [AFK]. Addressing an open problem of [BFS] and extending the work in [AFK], we show that, if one-way permutations exist, the following two statements are equivalent for any function f:
-
(i)
f has a one-prover, instance-hiding, zero-knowledge proof system.
-
(ii)
f is computable in polynomial space and has an instance-hiding scheme that leaks at most the length of the input.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
M. Abadi, J. Feigenbaum, and J. Kilian. On Hiding Information from an Oracle, J. Comput. System Sci. 39 (1989), 21–50.
D. Beaver, J. Feigenbaum, and V. Shoup. Hiding Instances in Zero-Knowledge Proof Systems, Proc. of the 10th CRYPTO (Santa Barbara, CA; August, 1990), Springer Verlag LNCS 537, 1991, 326–338.
S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems, SIAM J. Comput. 18 (1989), 186–208.
S. Goldreich, S. Micali and A. Wigderson. How to Play ANY Mental Game, Proc. of the 19th STOC (New York, NY; May, 1987), ACM, 218–229.
C. Lund, L. Fortnow, H. Karloff, and N. Nisan. Algebraic Methods for Interactive Proof Systems, Proc. of the 31st FOCS (St. Louis, MO; October, 1990), IEEE, 2–10.
R. Ostrovsky, R. Venkatesan, and M. Yung. Fair Games Against an All-Powerful Adversary, Proc. of SEQUENCES '91 (Positano, Italy; June, 1991).
A. Shamir. IP = PSPACE, Proc. of the 31st FOCS (St. Louis, MO; October, 1990), IEEE, 11–15.
A. C. Yao. How to Generate and Exchange Secrets, Proc. of the 27th FOCS (Toronto, Ontario; October, 1986), IEEE, 162–167.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Feigenbaum, J., Ostrovsky, R. (1993). A note on one-prover, instance-hiding zero-knowledge proof systems. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds) Advances in Cryptology — ASIACRYPT '91. ASIACRYPT 1991. Lecture Notes in Computer Science, vol 739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57332-1_30
Download citation
DOI: https://doi.org/10.1007/3-540-57332-1_30
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57332-6
Online ISBN: 978-3-540-48066-2
eBook Packages: Springer Book Archive